US20200042731A1 - Method for blocking access of malicious application and storage device implementing the same - Google Patents
Method for blocking access of malicious application and storage device implementing the same Download PDFInfo
- Publication number
- US20200042731A1 US20200042731A1 US16/051,591 US201816051591A US2020042731A1 US 20200042731 A1 US20200042731 A1 US 20200042731A1 US 201816051591 A US201816051591 A US 201816051591A US 2020042731 A1 US2020042731 A1 US 2020042731A1
- Authority
- US
- United States
- Prior art keywords
- access
- storage device
- address information
- application
- memory address
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1458—Protection against unauthorised use of memory or access to memory by checking the subject access rights
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1458—Protection against unauthorised use of memory or access to memory by checking the subject access rights
- G06F12/1483—Protection against unauthorised use of memory or access to memory by checking the subject access rights using an access-table, e.g. matrix or list
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/25—Integrating or interfacing systems involving database management systems
- G06F16/252—Integrating or interfacing systems involving database management systems between a Database Management System and a front-end application
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2212/00—Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
- G06F2212/10—Providing a specific technical effect
- G06F2212/1052—Security improvement
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Definitions
- Methods and apparatuses consistent with exemplary embodiments broadly relate to a method for blocking a malicious application and a storage device implementing the same.
- the present disclosure has been made in an effort to provide a technology for blocking an unauthorized malicious application before accessing a memory by implementing an access control mechanism before accessing the memory in a storage device.
- An exemplary embodiment provides a system for controlling access of one or more applications to a storage device.
- the system for controlling access of one or more applications to a storage device includes a storage device including one or more memories, and a kernel implemented between the applications and the storage device, wherein when the kernel receives a first access request to the storage device from a first application, the kernel transmits to the storage device first memory address information to be accessed by the first application and a first access code included in the first access request, and wherein the storage device stores a database for an authorized access code for each memory address information and controls the first application to access a memory corresponding to the first memory address information according to whether the first memory address information and the first access code are present in the database.
- the storage device maps the first access code to the first memory address information and stores the first access code in the database when the first access code is not present.
- the kernel stores information obtained by mapping the first memory address information and the first access code when processing for the first access request is delayed and deletes the information when the first application accesses the memory corresponding to the first memory address information.
- the kernel When the kernel receives a second access request to the storage device from a second application, the kernel transmits to the storage device second memory address information to be accessed by the second application and a second access code included in the second access request, and wherein the storage device retrieves whether the second access code is present in the database, retrieves third memory address information corresponding to the second access code in the database when the second access code is retrieved, and controls the second application to access the memory corresponding to the second memory address information according to whether the second memory address information and the third memory address information match each other.
- the method for controlling access of an application includes storing a database for an authorized access code for each memory address information, retrieving an access code included in the access request in the database when an access request to a file stored in a specific memory from the application, retrieving memory address information corresponding to the access code in the database when the access code is retrieved in the database, and comparing whether the memory address information of the specific memory included in the access request and memory information extracted with the access code in the database and controlling the application to access the file stored in the specific memory according to matching.
- the method for controlling access of an application further includes allowing the application to access the file stored in the specific memory when the access code is not retrieved.
- the method for controlling access of an application further includes mapping the access code included in the access request to the memory address information corresponding to the specific memory and storing the access code in the database when the specific memory is a memory requiring access control.
- the access code is information included in a first access request of the application.
- an access control mechanism is performed in a storage device, and as a result, a malicious application bypassing the access control mechanism performed in a file system can be blocked.
- FIG. 1 is a diagram for describing an environment in which a system for controlling an access of an application to a storage device is implemented and a structure of the system according to an exemplary embodiment of the present invention.
- FIG. 2 is a diagram for describing an operation of the access control system when the application requests an initial access to the storage device.
- FIG. 3 is a diagram for a method in which an access control system controls an application that accesses a storage device through a kernel according to an exemplary embodiment of the present invention.
- FIG. 4 is a diagram for describing a method in which the storage device controls the access of the application by using a database according to an exemplary embodiment of the present invention.
- FIG. 5 is a diagram for a method in which the access control system controls the application that directly accesses the storage device without passing through the kernel according to an exemplary embodiment of the present invention.
- FIG. 6 is a diagram for describing a method in which the storage device controls the access of the application according to an exemplary embodiment of the present invention.
- FIG. 1 is a diagram for describing an environment in which a system for controlling an access of an application to a storage device is implemented and a structure of the system according to an exemplary embodiment of the present invention.
- an environment 1000 in which a system is implemented includes an application 100 and an access control system 200 .
- the application 100 includes a first application 110 and a second application 120 and the applications 110 and 120 request system resources to perform a purpose assigned to each application.
- the applications 110 and 120 request access to a memory resource included in a storage device 220 in order to write data to the storage device 220 or read data written to in the storage device 220 .
- the application 100 may request access to the storage device 220 through a kernel 210 or directly request the access to the storage device 220 by bypassing the kernel 210 .
- the first application 110 may transmit a connection request to the storage device to the kernel 210 in order to access the storage device 220 and the kernel 210 that receives the access request may decide a memory which the first application 110 is to access in the storage device 220 and transmit memory address information to the storage device 220 so that the first application 110 accesses the decided memory.
- the second application 120 may directly transmit the access request to the storage device 220 by bypassing the kernel 210 and in this case, the access request includes memory address information which the second application 120 is to access.
- the access control system 200 includes the kernel 210 and the storage device 220 and the access control system 200 receives an access request to a file stored in a specific memory from the application 100 and controls the access of the application 100 according to whether an access code included in the access request matches an authorized access code corresponding to a specific memory to be accessed.
- the kernel 210 is implemented between the application 100 and the storage 220 and upon receiving the access request to the storage 220 from the application 100 , the kernel 210 decides the memory address information which the application 100 is to access and transmits the decided memory address information and the access code included in the access request to the storage device 220 .
- the storage device 220 includes one or more memories 221 to 223 and stores a database of an authorized access code for each memory address information and decides the authorized access code corresponding to the memory address information received from the kernel 210 or directly received from the application 100 . Thereafter, the storage device 220 determines whether the received access code is present in the database and when the received access code is present in the database, the storage device 220 allows the application 100 to access the memory corresponding to the memory address information, but when the received access code is not present in the database, the storage device 220 blocks the access of the application 100 .
- the storage device 220 may refer to a device that temporarily or permanently stores data in the memories 221 to 223 .
- the storage device 220 may be a solid-state drive (SSD).
- the malicious application since an unauthorized application is even denied access to the memory, the malicious application may be completely blocked and the access control mechanism is performed in the storage device 220 , and as a result, even the application for bypassing the kernel 210 may be blocked.
- FIG. 2 is a diagram for describing an operation of the access control system when the application requests an initial access to the storage device.
- the application 100 transmits to the kernel 210 the access request to the storage device 220 (S 100 ).
- step S 100 it is assumed that the application 100 first transmits the access request to write data to the storage device 220 .
- the access request transmitted by the application 100 includes data to be written to the storage device 220 .
- the application accesses the storage device 220 through the kernel 210 using a system call
- the application decides the access code for the file to be accessed and inserts the decided access code as a parameter of the system call and transmits the access code to the storage device 220 through the kernel 210 . That is, in the present invention, it is premised that when the application 100 accesses the storage device 220 through the kernel 210 using the system call, the access request transmitted by the application 100 includes the access code. Accordingly, when the application 100 requests the access to the storage device 220 through the kernel 210 as in step S 100 , the access request transmitted by the application 100 includes the access code.
- the kernel 210 Upon receiving the access request from the application 100 , the kernel 210 decides the memory address information in the storage device 220 to which the application 100 will write the data, and maps the decided memory address information to the corresponding data information and stores the memory address information mapped with the data information (S 101 ).
- the kernel 210 may use an Mode to manage a data structure for data in the storage device 220 , which may include data information and physical address information written in the storage device 220 . Accordingly, the kernel 210 generates the Mode for the data received from the application 100 , thereby mapping and storing the memory address information to which the data is to be written and the corresponding data information.
- the kernel 210 may store information obtained by mapping the decided memory address and the access code included in the received access request.
- the kernel 210 may decide the access code mapped to correspond to the memory address information decided at the time of processing the access request and transmit the corresponding access code to the storage device 220 together with the memory address information and the corresponding information may be deleted in order to protect information on the access code and minimize space overhead after terminating the access to the storage device 220 .
- the kernel 210 transmits the data, the access code, and the memory address information received from the application 100 to the storage device 220 (S 103 ).
- the storage device 220 since the application 100 first transmits the access request to write the data to the storage device 220 , there is no authorized access code corresponding to the memory address information in the storage device 220 . Accordingly, the storage device 220 generates a database by mapping the access code received from the kernel 210 with the decided memory address information (S 105 ).
- the database refers to a set of data that stores the memory address information and authorized access codes corresponding thereto, respectively, using a data structure such as a table, a linked list, or a tree.
- the storage device 220 may generate a table type database by mapping an authorized access code “0x000033” to memory address information “LPN: 0, PPN: 7”, mapping authorized access code “0x000018” to memory address information “LPN: 2, PPN: 3”, and mapping an authorized access code “0x000027” to memory address information “LPN: 4, PPN: 1” and may not store the authorized access code because the authorized access codes are not mapped to memory address information “LPN: 1, PPN: 10” and “LPN: 3, PPN: 15” in which no data is written.
- a table as shown in Table 1 is linearly configured and has an advantage that implementation is simple and a time required for retrieving the authorized access code to access the memory is relatively short.
- the authorized access code is unconditionally stored in the storage device 220 for a memory that does not need to be protected, there is a disadvantage that overhead that occupies a large amount of memory space in the storage device 220 may occur.
- the storage device 220 manages the memory address information in which data is to be written using a table composed of LPN and PPN in the same manner as Table 1, but may add a field to map the authorized access code only to the memory address information that needs to be protected and specify an authorized access code unique to the memory address information.
- the storage device 220 may map and store the authorized access code “0x000033” only to the corresponding memory address information.
- the memory address information requiring the access control may be decided by a user and the storage device 220 may store a table indicating whether the access control is required for each memory address information in order to check whether specific memory address information is memory address information requiring the access control.
- the storage device 220 may reduce the overhead in the storage device 220 due to the memory space by creating the table in the manner shown in Table 2.
- the information included in the item of “Whether access control is required” in table 2 occupies a small amount of memory space (1 bit) in the storage device 220 , and thus the information does not affect the overhead.
- the storage device 220 writes the data to the memory corresponding to the memory address information received from the kernel (S 107 ).
- the kernel 210 may map data information for the data received by the application 100 to the memory address information to which the corresponding data is to be written and store the data information mapped with the memory address information in the database.
- FIG. 3 is a diagram for a method in which an access control system controls an application that accesses a storage device through a kernel according to an exemplary embodiment of the present invention
- FIG. 4 is a diagram for describing a method in which the storage device controls the access of the application by using a database according to an exemplary embodiment of the present invention.
- the kernel 210 maps and stores the data information and the memory address information through the process illustrated in FIG. 2 and the storage device 220 generates the database for the authorized access code for each memory address information (S 200 ) and thereafter, the application 100 transmits the access request to the storage device 220 to the kernel 210 (S 201 ).
- the application 100 transmits the access request to read the data written to the storage device 220 and thus, the access request includes the data information to which the application 100 requests the access.
- the access request since the access request represents a case where the application 100 requests the access to the storage device 220 through the kernel 210 , the access request includes the access code generated by the system call.
- the kernel 210 Upon receiving the access request from the application 100 , the kernel 210 decides the memory address information to be accessed by the application 100 according to the data information included in the access request (S 203 ).
- the kernel 210 may manage the data structure of the data in the storage device 220 using the Mode. Therefore, the kernel 210 retrieves the received data information on the Mode to decide the memory address information in which the data corresponding information is written and decide the decided memory address information as the memory address information to be accessed by the application 100 .
- the kernel 210 transmits the decided memory address information and the access code included in the received access request to the storage device 220 (S 205 ).
- the storage device 220 decides whether the memory address information and the access code received from the kernel 210 are present in the database (S 207 ) and when the memory address information and the access code are present in the database, the storage device 220 allows the application 100 to access the memory corresponding to the memory address information (S 209 ) and when the memory address information and the access code are not present in the database, the storage device 220 blocks the access of the application 100 and transmits an error message to the application 100 (S 211 ).
- the storage device 220 creates the mapping table as shown in Table 1, and the kernel 210 transmits the memory address information “LPN: 0, PPN: 7” and the access code “0x000033” to the storage device 220 by a data read and access request of a first application, and the kernel 210 transmits the memory address information “LPN: 2, PPN: 3” and the access code “0xFFFFFF” to the storage device 220 by a data read and access request of a second application, since the authorized access code and the access code corresponding to the memory address information match each other in the case of the first application, the storage device 220 allows the first application to access the memory corresponding to the memory address information, but since in the case of the second application, the authorized access code and the access code corresponding to the memory address information does not match each other, the storage device 220 blocks the second application.
- the storage device 220 determines whether the memory address needs to be protected through “Whether access control is required” field in Table 2. If the field is “Y”, the storage device 220 retrieves whether the access code received from the kernel 210 is present in the table, retrieves the memory address information corresponding to the access code retrieved in the table when it is retrieved that the received access code is present in the table, controls the access to the memory corresponding to the memory address information received by the application according to whether the retrieved memory address information and the memory address information received from the kernel 210 match each other.
- the storage device 220 applies a hashing algorithm to the access code received through the kernel 210 to retrieve whether the authorized access code which is identical to the access code is present in the database, as shown in FIG. 4 in order to effectively retrieve the authorized access code and the memory address information and when the authorized access code is present in the database, the storage device 220 applies a red-black tree algorithm to the authorized access code to retrieve the memory address information corresponding to the authorized access code.
- the storage device 220 allows the access to the memory corresponding to the memory address information of the application 100 when the retrieved memory address information is the same as the memory address information received through the kernel 210 .
- the storage device 220 does not allow the access to the memory corresponding to the memory address information of the application 100 when the corresponding access code is not retrieved.
- a case where the memory corresponding to the memory address information received through the kernel 210 is the memory which needs to be protected is a case the application 100 first requests the access.
- the received access code is mapped to the memory address information to be stored in the database, and the access of the application 100 is allowed.
- the access of the application 100 is allowed without mapping and storing the access code and the memory address information.
- the application 100 When the access code is present in the database, but the memory address information corresponding to the authorized access code is different from the memory address information received through the kernel 210 , the application 100 requests the access to the memory which needs to be protected with an inappropriate access code, and as a result, the access of the application 100 is blocked and the error message is transmitted to the application 100 .
- the kernel 210 may create the database in which the decided memory address information and the access code included in the received access request are mapped and the database may be deleted in order to protect the information on the access code and minimize the space overhead after the application 100 terminates the access to the storage device 220 .
- FIG. 5 is a diagram for a method in which the access control system controls the application that directly accesses the storage device without passing through the kernel according to an exemplary embodiment of the present invention.
- the storage device 220 creates the database for the authorized access code for each memory address information through the process illustrated in FIG. 2 (S 300 ) and thereafter, the application 100 directly transmits the access request to the storage device 220 (S 301 ).
- the application 100 transmits the access request to read the data written to the storage device 220 and the access request transmitted by the application 100 includes the memory address information to be accessed by the application 100 , but the access to the storage device 220 is not requested through the kernel 210 by using the system call, and as a result, the access request does not include the access code.
- the storage device 220 decides the access code as “NULL” (S 303 ), decides whether the memory address corresponding the access code needs to be protected (S 305 ). If the memory address corresponding the access code needs to be protected, the storage device 220 blocks the access of the application 100 and transmits the error message to the application 100 (S 307 ). If the memory address corresponding the access code does not need to be protected, the storage device 220 allows the access of the application 100 (S 309 ).
- FIG. 6 is a diagram for describing a method in which the storage device controls the access of the application according to an exemplary embodiment of the present invention.
- the storage device 220 maps and stores the authorized access code for each memory address information (S 400 ).
- the access device 220 when the storage device 220 first receives from the application the access request to a specific memory in the storage device 220 , the access device 220 stores the access code included in the first access request as the authorized access code for the memory address information corresponding to the specific memory and maps and stores the memory address information and the decided authorized access code.
- the storage device 220 Upon receiving the access request to a file stored in a specific memory from the application, the storage device 220 retrieves whether the access code included in the access request is present in the database (S 410 ).
- the storage device 220 stores the database in which the authorized access code is mapped for each memory address information and thus, the storage device 220 retrieves whether the access code is present in the database by applying the hashing algorithm to the access code.
- the storage device 220 When the access code is not retrieved, the storage device 220 first allows the application to access the file stored in the specific memory.
- the storage device 220 allows the application to access the file stored in the specific memory.
- the storage device maps the access code included in the access request to the memory address information corresponding to the specific memory and stores the access code in the database only when the specific memory is a memory requiring access control.
- the storage device 220 retrieves the memory address information corresponding to the access code in the database (S 420 ).
- the storage device 220 applies a binary search tree to the access code to decide the memory address information stored while being mapped to the access code and in particular, may decide the memory address information by applying the red-black tree algorithm in the binary search tree.
- the storage device 220 compares the memory address information corresponding to the specific memory with the decided memory address information and controls the application to access the file stored in the specific memory according to the match between both memory address information (S 430 ).
- the storage device 220 allows access to the application when the memory address information corresponding to the specific memory matches the decided memory address information, but since the case where both memory address information does not match is the case where the application 100 requests the access to the memory which needs to be protected with the inappropriate access code, the storage device 220 blocks the access of the application 100 .
- the malicious application since even access of an unauthorized application is denied, the malicious application can be completely blocked.
- the access control mechanism is performed in the storage device, and as a result, the malicious application bypassing the access control mechanism performed in a file system can be blocked.
- the exemplary embodiments of the present invention described above can be implemented not through the apparatus and the method and can be implemented through a program which realizes a function corresponding to a configuration of the exemplary embodiments of the present invention or a recording medium having the program recorded therein.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Databases & Information Systems (AREA)
- Automation & Control Theory (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Mathematical Physics (AREA)
- Data Mining & Analysis (AREA)
- Storage Device Security (AREA)
Abstract
Description
- Methods and apparatuses consistent with exemplary embodiments broadly relate to a method for blocking a malicious application and a storage device implementing the same.
- In recent years, an attempt has increased to unauthorized access to a file of a user, which is stored in a storage device to damage the file and performed by illegally installing a malicious application on a computer of the user without permission of the user and executing the installed malicious application.
- In response to the attempt, development of a security system or a security application has been continuously carried out. However, existing technologies have monitored behavior patterns (increasing frequency of file name changes, continuous calling of an encryption function library, etc.) of a malicious program in order to detect or prevent the application program or restored the file from a precreated backup copy when the files are infected.
- However, as the malicious program evolves, the technologies can be easily avoided, and a data backup technology requires additional storage space and backed up data can also be infected by the malicious program.
- The above information disclosed in this Background section is only for enhancement of understanding of the background of the invention and therefore it may contain information that does not form the prior art that is already known in this country to a person of ordinary skill in the art.
- The present disclosure has been made in an effort to provide a technology for blocking an unauthorized malicious application before accessing a memory by implementing an access control mechanism before accessing the memory in a storage device.
- An exemplary embodiment provides a system for controlling access of one or more applications to a storage device. The system for controlling access of one or more applications to a storage device includes a storage device including one or more memories, and a kernel implemented between the applications and the storage device, wherein when the kernel receives a first access request to the storage device from a first application, the kernel transmits to the storage device first memory address information to be accessed by the first application and a first access code included in the first access request, and wherein the storage device stores a database for an authorized access code for each memory address information and controls the first application to access a memory corresponding to the first memory address information according to whether the first memory address information and the first access code are present in the database.
- The storage device maps the first access code to the first memory address information and stores the first access code in the database when the first access code is not present.
- The kernel stores information obtained by mapping the first memory address information and the first access code when processing for the first access request is delayed and deletes the information when the first application accesses the memory corresponding to the first memory address information.
- When the kernel receives a second access request to the storage device from a second application, the kernel transmits to the storage device second memory address information to be accessed by the second application and a second access code included in the second access request, and wherein the storage device retrieves whether the second access code is present in the database, retrieves third memory address information corresponding to the second access code in the database when the second access code is retrieved, and controls the second application to access the memory corresponding to the second memory address information according to whether the second memory address information and the third memory address information match each other.
- The method for controlling access of an application includes storing a database for an authorized access code for each memory address information, retrieving an access code included in the access request in the database when an access request to a file stored in a specific memory from the application, retrieving memory address information corresponding to the access code in the database when the access code is retrieved in the database, and comparing whether the memory address information of the specific memory included in the access request and memory information extracted with the access code in the database and controlling the application to access the file stored in the specific memory according to matching.
- The method for controlling access of an application further includes allowing the application to access the file stored in the specific memory when the access code is not retrieved.
- The method for controlling access of an application further includes mapping the access code included in the access request to the memory address information corresponding to the specific memory and storing the access code in the database when the specific memory is a memory requiring access control.
- When the access code is retrieved in the database, the access code is information included in a first access request of the application.
- According to exemplary embodiments of the present invention, since even access of an unauthorized application is denied, a malicious application can be completely blocked.
- Further, according to exemplary embodiments of the present invention, an access control mechanism is performed in a storage device, and as a result, a malicious application bypassing the access control mechanism performed in a file system can be blocked.
- The above and other aspects, features, and advantages of various exemplary embodiments of the present disclosure will be more apparent from the following description taken in conjunction with the accompanying drawings, in which:
-
FIG. 1 is a diagram for describing an environment in which a system for controlling an access of an application to a storage device is implemented and a structure of the system according to an exemplary embodiment of the present invention. -
FIG. 2 is a diagram for describing an operation of the access control system when the application requests an initial access to the storage device. -
FIG. 3 is a diagram for a method in which an access control system controls an application that accesses a storage device through a kernel according to an exemplary embodiment of the present invention. -
FIG. 4 is a diagram for describing a method in which the storage device controls the access of the application by using a database according to an exemplary embodiment of the present invention. -
FIG. 5 is a diagram for a method in which the access control system controls the application that directly accesses the storage device without passing through the kernel according to an exemplary embodiment of the present invention. -
FIG. 6 is a diagram for describing a method in which the storage device controls the access of the application according to an exemplary embodiment of the present invention. - In the following detailed description, only certain exemplary embodiments of the present invention have been shown and described, simply by way of illustration. As those skilled in the art would realize, the described embodiments may be modified in various different ways, all without departing from the spirit or scope of the present invention. Accordingly, the drawings and description are to be regarded as illustrative in nature and not restrictive. Like reference numerals designate like elements throughout the specification.
- Throughout the specification, unless explicitly described to the contrary, the word “comprise” and variations such as “comprises” or “comprising”, will be understood to imply the inclusion of stated elements but not the exclusion of any other elements.
-
FIG. 1 is a diagram for describing an environment in which a system for controlling an access of an application to a storage device is implemented and a structure of the system according to an exemplary embodiment of the present invention. - Referring to
FIG. 1 , anenvironment 1000 in which a system is implemented includes anapplication 100 and anaccess control system 200. - The
application 100 includes afirst application 110 and asecond application 120 and the 110 and 120 request system resources to perform a purpose assigned to each application. In the present invention, it is assumed that theapplications 110 and 120 request access to a memory resource included in aapplications storage device 220 in order to write data to thestorage device 220 or read data written to in thestorage device 220. - When the
application 100 requests access to thestorage device 220, theapplication 100 may request access to thestorage device 220 through akernel 210 or directly request the access to thestorage device 220 by bypassing thekernel 210. - For example, the
first application 110 may transmit a connection request to the storage device to thekernel 210 in order to access thestorage device 220 and thekernel 210 that receives the access request may decide a memory which thefirst application 110 is to access in thestorage device 220 and transmit memory address information to thestorage device 220 so that thefirst application 110 accesses the decided memory. - Further, for example, the
second application 120 may directly transmit the access request to thestorage device 220 by bypassing thekernel 210 and in this case, the access request includes memory address information which thesecond application 120 is to access. - The
access control system 200 includes thekernel 210 and thestorage device 220 and theaccess control system 200 receives an access request to a file stored in a specific memory from theapplication 100 and controls the access of theapplication 100 according to whether an access code included in the access request matches an authorized access code corresponding to a specific memory to be accessed. - The
kernel 210 is implemented between theapplication 100 and thestorage 220 and upon receiving the access request to thestorage 220 from theapplication 100, thekernel 210 decides the memory address information which theapplication 100 is to access and transmits the decided memory address information and the access code included in the access request to thestorage device 220. - The
storage device 220 includes one ormore memories 221 to 223 and stores a database of an authorized access code for each memory address information and decides the authorized access code corresponding to the memory address information received from thekernel 210 or directly received from theapplication 100. Thereafter, thestorage device 220 determines whether the received access code is present in the database and when the received access code is present in the database, thestorage device 220 allows theapplication 100 to access the memory corresponding to the memory address information, but when the received access code is not present in the database, thestorage device 220 blocks the access of theapplication 100. - The
storage device 220 may refer to a device that temporarily or permanently stores data in thememories 221 to 223. In particular, thestorage device 220 may be a solid-state drive (SSD). - According to the present invention, since an unauthorized application is even denied access to the memory, the malicious application may be completely blocked and the access control mechanism is performed in the
storage device 220, and as a result, even the application for bypassing thekernel 210 may be blocked. - Hereinafter, a method in which the access control system controls access to the storage device of the application according to an exemplary embodiment will be described with reference to
FIGS. 2 to 4 . -
FIG. 2 is a diagram for describing an operation of the access control system when the application requests an initial access to the storage device. - Referring to
FIG. 2 , theapplication 100 transmits to thekernel 210 the access request to the storage device 220 (S100). In step S100, it is assumed that theapplication 100 first transmits the access request to write data to thestorage device 220. Thus, the access request transmitted by theapplication 100 includes data to be written to thestorage device 220. - Meanwhile, when the application accesses the
storage device 220 through thekernel 210 using a system call, the application decides the access code for the file to be accessed and inserts the decided access code as a parameter of the system call and transmits the access code to thestorage device 220 through thekernel 210. That is, in the present invention, it is premised that when theapplication 100 accesses thestorage device 220 through thekernel 210 using the system call, the access request transmitted by theapplication 100 includes the access code. Accordingly, when theapplication 100 requests the access to thestorage device 220 through thekernel 210 as in step S100, the access request transmitted by theapplication 100 includes the access code. - Upon receiving the access request from the
application 100, thekernel 210 decides the memory address information in thestorage device 220 to which theapplication 100 will write the data, and maps the decided memory address information to the corresponding data information and stores the memory address information mapped with the data information (S101). - For example, the
kernel 210 may use an Mode to manage a data structure for data in thestorage device 220, which may include data information and physical address information written in thestorage device 220. Accordingly, thekernel 210 generates the Mode for the data received from theapplication 100, thereby mapping and storing the memory address information to which the data is to be written and the corresponding data information. - Although not illustrated in
FIG. 2 , after step S101, thekernel 210 may store information obtained by mapping the decided memory address and the access code included in the received access request. - The reason is that when the
kernel 210 receives the access request from theapplication 100 and thereafter, multiple system calls are generated and the corresponding access request may not be processed immediately, so that the processing is delayed, there is a problem that the decided memory address information and access code may not be simultaneously transmitted to thestorage device 220. Accordingly, after storing the information obtained by mapping the memory address information and the access code, thekernel 210 may decide the access code mapped to correspond to the memory address information decided at the time of processing the access request and transmit the corresponding access code to thestorage device 220 together with the memory address information and the corresponding information may be deleted in order to protect information on the access code and minimize space overhead after terminating the access to thestorage device 220. - The
kernel 210 transmits the data, the access code, and the memory address information received from theapplication 100 to the storage device 220 (S103). - In the case of
FIG. 2 , since theapplication 100 first transmits the access request to write the data to thestorage device 220, there is no authorized access code corresponding to the memory address information in thestorage device 220. Accordingly, thestorage device 220 generates a database by mapping the access code received from thekernel 210 with the decided memory address information (S105). - Herein, the database refers to a set of data that stores the memory address information and authorized access codes corresponding thereto, respectively, using a data structure such as a table, a linked list, or a tree.
- For example, the
storage device 220 may generate a table type database by mapping an authorized access code “0x000033” to memory address information “LPN: 0, PPN: 7”, mapping authorized access code “0x000018” to memory address information “LPN: 2, PPN: 3”, and mapping an authorized access code “0x000027” to memory address information “LPN: 4, PPN: 1” and may not store the authorized access code because the authorized access codes are not mapped to memory address information “LPN: 1, PPN: 10” and “LPN: 3, PPN: 15” in which no data is written. -
TABLE 1 LPN PPN KEY 0 7 0x000033 1 10 NULL 2 3 0x000018 3 15 NULL 4 1 0x000027 - Meanwhile, a table as shown in Table 1 is linearly configured and has an advantage that implementation is simple and a time required for retrieving the authorized access code to access the memory is relatively short. However, since the authorized access code is unconditionally stored in the
storage device 220 for a memory that does not need to be protected, there is a disadvantage that overhead that occupies a large amount of memory space in thestorage device 220 may occur. - Accordingly, the
storage device 220 manages the memory address information in which data is to be written using a table composed of LPN and PPN in the same manner as Table 1, but may add a field to map the authorized access code only to the memory address information that needs to be protected and specify an authorized access code unique to the memory address information. - For example, when access control is required for the memory address information “LPN: 0, PPN: 7” among the entire memory address information as shown in Table 2 below, the
storage device 220 may map and store the authorized access code “0x000033” only to the corresponding memory address information. The memory address information requiring the access control may be decided by a user and thestorage device 220 may store a table indicating whether the access control is required for each memory address information in order to check whether specific memory address information is memory address information requiring the access control. -
TABLE 2 Whether access LPN PPN control is required KEY 0 7 Y 0x000033 1 10 N — 2 3 N — 3 15 N — 4 1 N — - The
storage device 220 may reduce the overhead in thestorage device 220 due to the memory space by creating the table in the manner shown in Table 2. The information included in the item of “Whether access control is required” in table 2 occupies a small amount of memory space (1 bit) in thestorage device 220, and thus the information does not affect the overhead. - The
storage device 220 writes the data to the memory corresponding to the memory address information received from the kernel (S107). - By repeating the steps, the
kernel 210 may map data information for the data received by theapplication 100 to the memory address information to which the corresponding data is to be written and store the data information mapped with the memory address information in the database. -
FIG. 3 is a diagram for a method in which an access control system controls an application that accesses a storage device through a kernel according to an exemplary embodiment of the present invention andFIG. 4 is a diagram for describing a method in which the storage device controls the access of the application by using a database according to an exemplary embodiment of the present invention. - Referring to
FIG. 3 , thekernel 210 maps and stores the data information and the memory address information through the process illustrated inFIG. 2 and thestorage device 220 generates the database for the authorized access code for each memory address information (S200) and thereafter, theapplication 100 transmits the access request to thestorage device 220 to the kernel 210 (S201). In this case, it is assumed that theapplication 100 transmits the access request to read the data written to thestorage device 220 and thus, the access request includes the data information to which theapplication 100 requests the access. Further, since the access request represents a case where theapplication 100 requests the access to thestorage device 220 through thekernel 210, the access request includes the access code generated by the system call. - Upon receiving the access request from the
application 100, thekernel 210 decides the memory address information to be accessed by theapplication 100 according to the data information included in the access request (S203). - For example, as described with reference to
FIG. 2 , thekernel 210 may manage the data structure of the data in thestorage device 220 using the Mode. Therefore, thekernel 210 retrieves the received data information on the Mode to decide the memory address information in which the data corresponding information is written and decide the decided memory address information as the memory address information to be accessed by theapplication 100. - The
kernel 210 transmits the decided memory address information and the access code included in the received access request to the storage device 220 (S205). Thestorage device 220 decides whether the memory address information and the access code received from thekernel 210 are present in the database (S207) and when the memory address information and the access code are present in the database, thestorage device 220 allows theapplication 100 to access the memory corresponding to the memory address information (S209) and when the memory address information and the access code are not present in the database, thestorage device 220 blocks the access of theapplication 100 and transmits an error message to the application 100 (S211). - In an exemplary embodiment, the
storage device 220 creates the mapping table as shown in Table 1, and thekernel 210 transmits the memory address information “LPN: 0, PPN: 7” and the access code “0x000033” to thestorage device 220 by a data read and access request of a first application, and thekernel 210 transmits the memory address information “LPN: 2, PPN: 3” and the access code “0xFFFFFF” to thestorage device 220 by a data read and access request of a second application, since the authorized access code and the access code corresponding to the memory address information match each other in the case of the first application, thestorage device 220 allows the first application to access the memory corresponding to the memory address information, but since in the case of the second application, the authorized access code and the access code corresponding to the memory address information does not match each other, thestorage device 220 blocks the second application. - In another exemplary embodiment, when the
storage device 220 creates the mapping table as shown in Table 2, thestorage device 220 determines whether the memory address needs to be protected through “Whether access control is required” field in Table 2. If the field is “Y”, thestorage device 220 retrieves whether the access code received from thekernel 210 is present in the table, retrieves the memory address information corresponding to the access code retrieved in the table when it is retrieved that the received access code is present in the table, controls the access to the memory corresponding to the memory address information received by the application according to whether the retrieved memory address information and the memory address information received from thekernel 210 match each other. - In this case, the
storage device 220 applies a hashing algorithm to the access code received through thekernel 210 to retrieve whether the authorized access code which is identical to the access code is present in the database, as shown inFIG. 4 in order to effectively retrieve the authorized access code and the memory address information and when the authorized access code is present in the database, thestorage device 220 applies a red-black tree algorithm to the authorized access code to retrieve the memory address information corresponding to the authorized access code. - Thereafter, the
storage device 220 allows the access to the memory corresponding to the memory address information of theapplication 100 when the retrieved memory address information is the same as the memory address information received through thekernel 210. - However, the
storage device 220 does not allow the access to the memory corresponding to the memory address information of theapplication 100 when the corresponding access code is not retrieved. - If the field is “N”, a case where the memory corresponding to the memory address information received through the
kernel 210 is the memory which needs to be protected is a case theapplication 100 first requests the access. In this case, the received access code is mapped to the memory address information to be stored in the database, and the access of theapplication 100 is allowed. When the memory corresponding to the memory address information received through thekernel 210 is the memory which need not be protected, the access of theapplication 100 is allowed without mapping and storing the access code and the memory address information. - When the access code is present in the database, but the memory address information corresponding to the authorized access code is different from the memory address information received through the
kernel 210, theapplication 100 requests the access to the memory which needs to be protected with an inappropriate access code, and as a result, the access of theapplication 100 is blocked and the error message is transmitted to theapplication 100. - Meanwhile, before step S203, similarly as in
FIG. 2 , thekernel 210 may create the database in which the decided memory address information and the access code included in the received access request are mapped and the database may be deleted in order to protect the information on the access code and minimize the space overhead after theapplication 100 terminates the access to thestorage device 220. -
FIG. 5 is a diagram for a method in which the access control system controls the application that directly accesses the storage device without passing through the kernel according to an exemplary embodiment of the present invention. - Referring to
FIG. 5 , thestorage device 220 creates the database for the authorized access code for each memory address information through the process illustrated inFIG. 2 (S300) and thereafter, theapplication 100 directly transmits the access request to the storage device 220 (S301). In this case, it is assumed that theapplication 100 transmits the access request to read the data written to thestorage device 220 and the access request transmitted by theapplication 100 includes the memory address information to be accessed by theapplication 100, but the access to thestorage device 220 is not requested through thekernel 210 by using the system call, and as a result, the access request does not include the access code. - When the access request received from the
application 100 does not include the access code, thestorage device 220 decides the access code as “NULL” (S303), decides whether the memory address corresponding the access code needs to be protected (S305). If the memory address corresponding the access code needs to be protected, thestorage device 220 blocks the access of theapplication 100 and transmits the error message to the application 100 (S307). If the memory address corresponding the access code does not need to be protected, thestorage device 220 allows the access of the application 100 (S309). -
FIG. 6 is a diagram for describing a method in which the storage device controls the access of the application according to an exemplary embodiment of the present invention. - Referring to
FIG. 6 , thestorage device 220 maps and stores the authorized access code for each memory address information (S400). - Specifically, when the
storage device 220 first receives from the application the access request to a specific memory in thestorage device 220, theaccess device 220 stores the access code included in the first access request as the authorized access code for the memory address information corresponding to the specific memory and maps and stores the memory address information and the decided authorized access code. - Upon receiving the access request to a file stored in a specific memory from the application, the
storage device 220 retrieves whether the access code included in the access request is present in the database (S410). - Specifically, the
storage device 220 stores the database in which the authorized access code is mapped for each memory address information and thus, thestorage device 220 retrieves whether the access code is present in the database by applying the hashing algorithm to the access code. - When the access code is not retrieved, the
storage device 220 first allows the application to access the file stored in the specific memory. - That is, since the case where the access code is not retrieved is the case where the application first accesses the specific memory or the case where the memory corresponding to the memory address information is the memory which need not be protected, the
storage device 220 allows the application to access the file stored in the specific memory. - Further, the storage device maps the access code included in the access request to the memory address information corresponding to the specific memory and stores the access code in the database only when the specific memory is a memory requiring access control.
- When the access code is retrieved, the
storage device 220 retrieves the memory address information corresponding to the access code in the database (S420). - Specifically, the
storage device 220 applies a binary search tree to the access code to decide the memory address information stored while being mapped to the access code and in particular, may decide the memory address information by applying the red-black tree algorithm in the binary search tree. - The
storage device 220 compares the memory address information corresponding to the specific memory with the decided memory address information and controls the application to access the file stored in the specific memory according to the match between both memory address information (S430). - Specifically, the
storage device 220 allows access to the application when the memory address information corresponding to the specific memory matches the decided memory address information, but since the case where both memory address information does not match is the case where theapplication 100 requests the access to the memory which needs to be protected with the inappropriate access code, thestorage device 220 blocks the access of theapplication 100. - According to the present invention, since even access of an unauthorized application is denied, the malicious application can be completely blocked.
- Further, according to the present invention, the access control mechanism is performed in the storage device, and as a result, the malicious application bypassing the access control mechanism performed in a file system can be blocked.
- The exemplary embodiments of the present invention described above can be implemented not through the apparatus and the method and can be implemented through a program which realizes a function corresponding to a configuration of the exemplary embodiments of the present invention or a recording medium having the program recorded therein.
- While this invention has been described in connection with what is presently considered to be practical exemplary embodiments, it is to be understood that the invention is not limited to the disclosed embodiments, but, on the contrary, is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims.
Claims (8)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US16/051,591 US10831916B2 (en) | 2018-08-01 | 2018-08-01 | Method for blocking access of malicious application and storage device implementing the same |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US16/051,591 US10831916B2 (en) | 2018-08-01 | 2018-08-01 | Method for blocking access of malicious application and storage device implementing the same |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| US20200042731A1 true US20200042731A1 (en) | 2020-02-06 |
| US10831916B2 US10831916B2 (en) | 2020-11-10 |
Family
ID=69228108
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US16/051,591 Active 2039-04-06 US10831916B2 (en) | 2018-08-01 | 2018-08-01 | Method for blocking access of malicious application and storage device implementing the same |
Country Status (1)
| Country | Link |
|---|---|
| US (1) | US10831916B2 (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11372756B2 (en) * | 2020-09-17 | 2022-06-28 | Qualcomm Incorporated | Memory pool management |
| US12326927B2 (en) * | 2022-12-21 | 2025-06-10 | Rakuten Symphony, Inc. | System and method for automatic onboarding of network functions to a credential vault |
Citations (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20010049705A1 (en) * | 2000-05-31 | 2001-12-06 | Takeo Murase | Electronic document processing system and electronic document processors |
| US20120284786A1 (en) * | 2011-05-05 | 2012-11-08 | Visto Corporation | System and method for providing access credentials |
| US20130347073A1 (en) * | 2012-06-22 | 2013-12-26 | Ellison W. Bryksa | Authorizing secured wireless access at hotspot having open wireless network and secure wireless network |
| US20140181454A1 (en) * | 2012-12-20 | 2014-06-26 | Oracle International Corporation | Method and system for efficient memory region deallocation |
| US20160154590A1 (en) * | 2013-08-06 | 2016-06-02 | Huawei Technologies Co., Ltd. | Memory Access Processing Method, Apparatus, and System |
| US20160350260A1 (en) * | 2015-05-27 | 2016-12-01 | Red Hat Israel, Ltd. | Dynamic Non-Uniform Memory Architecture (NUMA) Locality for Remote Direct Memory Access (RDMA) Applications |
| US9875597B2 (en) * | 2006-09-29 | 2018-01-23 | Bally Gaming, Inc. | Processing user information in wagering game systems |
| US20180025171A1 (en) * | 2016-07-20 | 2018-01-25 | Montage Technology (Shanghai) Co., Ltd. | Method and apparatus for controlling application to access memory |
| US10387399B1 (en) * | 2013-11-01 | 2019-08-20 | Amazon Technologies, Inc. | Efficient database journaling using non-volatile system memory |
| US20200021448A1 (en) * | 2018-07-13 | 2020-01-16 | Robert Chumbley | Public-private key pair account login and key manager |
Family Cites Families (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR101883713B1 (en) | 2016-09-22 | 2018-07-31 | 주식회사 위드네트웍스 | Apparatus and method for blocking ransome ware using access control to the contents file |
-
2018
- 2018-08-01 US US16/051,591 patent/US10831916B2/en active Active
Patent Citations (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20010049705A1 (en) * | 2000-05-31 | 2001-12-06 | Takeo Murase | Electronic document processing system and electronic document processors |
| US9875597B2 (en) * | 2006-09-29 | 2018-01-23 | Bally Gaming, Inc. | Processing user information in wagering game systems |
| US20120284786A1 (en) * | 2011-05-05 | 2012-11-08 | Visto Corporation | System and method for providing access credentials |
| US20130347073A1 (en) * | 2012-06-22 | 2013-12-26 | Ellison W. Bryksa | Authorizing secured wireless access at hotspot having open wireless network and secure wireless network |
| US20140181454A1 (en) * | 2012-12-20 | 2014-06-26 | Oracle International Corporation | Method and system for efficient memory region deallocation |
| US20160154590A1 (en) * | 2013-08-06 | 2016-06-02 | Huawei Technologies Co., Ltd. | Memory Access Processing Method, Apparatus, and System |
| US10387399B1 (en) * | 2013-11-01 | 2019-08-20 | Amazon Technologies, Inc. | Efficient database journaling using non-volatile system memory |
| US20160350260A1 (en) * | 2015-05-27 | 2016-12-01 | Red Hat Israel, Ltd. | Dynamic Non-Uniform Memory Architecture (NUMA) Locality for Remote Direct Memory Access (RDMA) Applications |
| US20180025171A1 (en) * | 2016-07-20 | 2018-01-25 | Montage Technology (Shanghai) Co., Ltd. | Method and apparatus for controlling application to access memory |
| US20200021448A1 (en) * | 2018-07-13 | 2020-01-16 | Robert Chumbley | Public-private key pair account login and key manager |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11372756B2 (en) * | 2020-09-17 | 2022-06-28 | Qualcomm Incorporated | Memory pool management |
| US12326927B2 (en) * | 2022-12-21 | 2025-06-10 | Rakuten Symphony, Inc. | System and method for automatic onboarding of network functions to a credential vault |
Also Published As
| Publication number | Publication date |
|---|---|
| US10831916B2 (en) | 2020-11-10 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US9223612B1 (en) | Object-based commands with quality of service identifiers | |
| US9646176B2 (en) | Method for encrypting database | |
| US10204235B2 (en) | Content item encryption on mobile devices | |
| US7809958B2 (en) | Method for guaranteeing freshness of results for queries against a non-secure data store | |
| US20180109501A1 (en) | Migration containers | |
| US10380100B2 (en) | Generalized verification scheme for safe metadata modification | |
| US11256824B2 (en) | Securing database backups with unique global identifier | |
| EP4121881B1 (en) | Method and non-transitory computer-readable medium for protecting a folder from unauthorized file modification | |
| US10831916B2 (en) | Method for blocking access of malicious application and storage device implementing the same | |
| CN112825098A (en) | Data protection method and device, computing equipment and storage medium | |
| US9465752B2 (en) | Systems and/or methods for policy-based access to data in memory tiers | |
| US10999310B2 (en) | Endpoint security client embedded in storage drive firmware | |
| CN111913915B (en) | File hiding method and device | |
| US9218296B2 (en) | Low-latency, low-overhead hybrid encryption scheme | |
| US9305142B1 (en) | Buffer memory protection unit | |
| US20230244796A1 (en) | A database server system | |
| CN116089327A (en) | Data protection method and related equipment | |
| US10592437B2 (en) | Memory matching key capability | |
| CN112235102A (en) | Hybrid key storage and management method and storage device | |
| US20250190600A1 (en) | Method of securely storing critical information | |
| KR102386219B1 (en) | Method And System for Policy-Based Versioning based on SGX-SSD | |
| US20240078348A1 (en) | System for forensic tracing of memory device content erasure and tampering | |
| US12282573B2 (en) | File system protection apparatus and method in auxiliary storage device | |
| CN119026188A (en) | Cloud storage data management method, system, electronic device and storage medium | |
| KR20210060852A (en) | Data managent method for avoiding evasion the retention period set in data through reference time falsification in data storage system |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment |
Owner name: SOGANG UNIVERSITY RESEARCH FOUNDATION, KOREA, REPUBLIC OF Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KIM, YOUNGJAE;LEE, JUNGHEE;AHN, JIN WOO;AND OTHERS;REEL/FRAME:046521/0926 Effective date: 20180430 |
|
| FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
| FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO SMALL (ORIGINAL EVENT CODE: SMAL); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT RECEIVED |
|
| STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
| MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2551); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Year of fee payment: 4 |